As Perimeter Defenses Fall, the Identify-First Approach Steps into the Breach | In the News

By nearly all accounts, security leaders are increasingly shifting their focus from perimeter defenses such as the long-relied-upon firewall in favor of embracing a zero-trust approach.

Everest Group, estimates that 65% of its clients opt for an identity-based zero-trust implementation approach (versus 35% opting for the overlay network approach). “Identity is becoming the default perimeter; it’s becoming the first line of defense,” says Kumar Avijit, Practice Director in Everest Group’s Information Technology Services team.

Read more in CSO.

How can we engage?

Please let us know how we can help you on your journey.

Contact Us

"*" indicates required fields

Please review our Privacy Notice and check the box below to consent to the use of Personal Data that you provide.